A Min, + System Theory for Constrained Traffic Regulation and Dynamic Service Guarantees

Size: px
Start display at page:

Download "A Min, + System Theory for Constrained Traffic Regulation and Dynamic Service Guarantees"

Transcription

1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER A Min, + System Theory for Constrained Traffic Regulation Dynamic Service Guarantees Cheng-Shang Chang, Senior Member, IEEE, Rene L Cruz, Senior Member, IEEE, Jean-Yves Le Boudec, Patrick Thiran, Member, IEEE Abstract By extending the system theory under the (min, +) algebra to the time-varying setting, we solve the problem of constrained traffic regulation develop a calculus for dynamic service guarantees For a constrained traffic-regulation problem with maximum tolerable delay maximum buffer size, the optimal regulator that generates the output traffic conforming to a subadditive envelope minimizes the number of discarded packets is a concatenation of the -clipper with ( ) = min[ ( + ) ( ) + ] the maximal -regulator The -clipper is a bufferless device, which optimally drops packets as necessary in order that its output be conformant to an envelope The maximal -regulator is a buffered device that delays packets as necessary in order that its output be conformant to an envelope The maximal -regulator is a linear time-invariant filter with impulse response, under the (min +) algebra To provide dynamic service guarantees in a network, we develop the concept of a dynamic server as a basic network element Dynamic servers can be joined by concatenation, filter bank summation, feedback to form a composite dynamic server We also show that dynamic service guarantees for multiple input streams sharing a work-conserving link can be achieved by a dynamic service curve earliest deadline scheduling algorithm, if an appropriate admission control is enforced Index Terms Buffer overflow, (min +) algebra, network calculus, packet losses, performance analysis, traffic shaping I INTRODUCTION FUTURE high-speed digital networks aim to provide integrated services, including voice, video, fax, data To control interaction among traffic generated by different sources, traffic regulation seems inevitable In [10], Cruz proposed the following deterministic traffic characterization A traffic stream, described by a nondecreasing sequence Manuscript received October 15, 2001; revised January 30, 2002; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M Ammar This work was supported in part by the National Science Council, Taiwan, ROC, under Contract NSC E Contract NSC E , by the US National Science Foundation under Grant NCR Grant NCR , by the Center for Wireless Communications at the University of California at San Diego, by the Priority Program in Information Communication Structures of the Swiss National Science under Grant SPP ICS C-S Chang is with the Department of Electrical Engineering, National Tsing Hua University, Hsinchu, Taiwan, ROC ( cschang@eenthuedutw) R L Cruz is with the Department of Electrical Computer Engineering, University of California at San Diego, La Jolla, CA USA ( cruz@eceucsdedu) J-Y Le Boudec P Thiran are with the School of Computer Communication Sciences, Ecole Polytechnique Fédérale de Lausanne, Luasanne CH-1015, Switerl ( jean-yvesleboudec@epflch) Digital Object Identifier /TNET function [with, called an envelope, if ], conforms to a Without loss of generality, an envelope can be assumed to be subadditive [6], ie, for all Using this characterization, a calculus is developed in [10] [11] to compute deterministic performance measures, such as bounds on delay bounds on queue length Traffic regulation addresses the problem of modifying a traffic stream so that it conforms to a subadditive envelope The problem of traffic regulation was treated systematically in [8] [20], where it is shown that the optimal traffic regulator that generates an output conforming to a subadditive envelope for an input is a linear time-invariant filter with the impulse response algebra, ie, under the We call such a filter the maximal -regulator This characterization was also observed in [1], [2], [27] As the buffer in the maximal -regulator is assumed to be infinite, packets from the input might be queued at the regulator For a real-time service, the delay of a queued packet at the regulator might exceed a maximum tolerable delay such a packet should be discarded (ie, clipped) The problem of traffic regulation with such a delay constraint is called the constrained traffic-regulation problem in [19] Its objective is to find a regulator that not only generates traffic conforming to an envelope, but also minimizes the number of discarded packets In addition to the delay constraint, Konstantopoulos Anantharam [19] also considered the buffer constraint for the regulator For, they derived optimal traffic regulators that satisfied either the delay constraint or the buffer constraint Cruz Taneja [16] considered the zero delay case of the constrained traffic-regulation problem This is also the case without any buffer By extending the time-invariant filtering theory under the algebra to the time-varying setting, it is shown there that the departure process of the optimal zero-delay regulator, which generates a departure process conformant to, is the subadditive closure [8] of the arrival process convolved with Such a bufferless regulator is called the -clipper in [16] Motivated by all these works, one of the main objectives of this paper is to provide an optimal implementable solution for the general constrained traffic-regulation problem with both /02$ IEEE

2 806 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 the delay buffer constraints As in [16], our approach is based on the time-varying filtering theory under the algebra By extending the subadditive closure in [8] to the timevarying setting, we show that the -clipper with input output can be implemented using the following recursive equation: The computation complexity of the -clipper is almost the same as that of the maximal -regulator The recursive equation also implies that the -clipper is greedy Packets are discarded only when needed For the constrained traffic-regulation problem with maximum tolerable delay maximum buffer size, the optimal traffic regulator is shown to be a concatenation of the -clipper with the maximal -regulator The solution is intuitive as the output from the -clipper conforms to the envelope that yields bounded delay bounded queue length at the maximal -regulator For example, when, the corresponding -clipper can be implemented by parallel bufferless -leaky buckets A packet is discarded if it cannot be admitted to one of these leaky buckets The output from the -clipper is then fed into parallel -leaky buckets In addition, the time-varying filtering theory can also be used for dynamic service guarantees By extending the concept of the service curve in [1], [12], [20] to a bivariate function, we define a dynamic -server for an input if its output satisfies Analogous to the time-invariant filtering theory in [1], [8], [20], a dynamic -server can be viewed as a linear filter with the time-varying impulse response It can be combined by concatenation, filter bank summation, feedback to form a composite dynamic server We illustrate the use of the dynamic server by considering a work-conserving link with a timevarying capacity a dynamic window-flow-control problem We also show that dynamic service guarantees for multiple input streams sharing a work-conserving link can be achieved by a dynamic service curve earliest deadline (SCED) scheduling algorithm if an appropriate admission control is enforced As the SCED algorithm in [27], the dynamic SCED algorithm is an earliest deadline first (EDF) policy that schedules packets according to their deadlines The remainder of this paper is organized as follows In Section II, we introduce the time-varying filtering theory under the algebra The development is parallel to the time-invariant filtering theory in [1], [8], [20] The reader is also referred to [3] [4], which contain results overlapping with this paper In Sections III IV, we introduce the maximal dynamic traffic regulators maximal dynamic clippers, respectively These are used for solving the problem of constrained traffic regulation in Section V In Section VI, we develop the concept of dynamic servers their associated calculus We show in Section VII that the dynamic SCED algorithm can be used to achieve dynamic service guarantees We conclude the paper in Section VIII by discussing possible extensions applications II TIME-VARYING FILTERING THEORY UNDER THE MIN, ALGEBRA In the section, we introduce the time-varying filtering theory under the algebra The development is parallel to the time-invariant filtering theory in [1], [8], [20] To extend the algebra to the time-varying setting, we consider the family of bivariate functions for all Thus, for any, is nonnegative nondecreasing in For any two bivariate functions in, we say (respectively, )if [respectively, ] for all We define the following two operations for functions in i) ( ) the pointwise minimum of two functions ii) (convolution) the convolution of two functions under the algebra One can easily verify that is a complete dioid (see, eg, [5]) with the zero function the identity function, where for all, if otherwise To be precise, we have the following properties 1 (Associativity) 2 (Commutativity) 3 (Distributivity for infinite sums ) For any two sequences of functions in 4 (Zero element) 5 (Absorbing zero element) 6 (Identity element)

3 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES (Idempotency of addition) Thus, The key difference to the time-invariant filtering theory is that we do not have the commutative property for in, ie, in general Let : That is, a function if for all As in the time-invariant case, we still have the following monotonicity 8 (Monotonicity) If (respectively, ) isin, then (respectively, ) If both are in, then For any function, define the unitary operator (called the closure operation in this paper) where is the self-convolution of for times, ie,,, The limit in (1) exists as is decreasing in Exping (1) yields where is any subset of with In addition to the algebraic properties, we present several important properties in Lemmas that will be used to prove results for constrained traffic regulation service guarantees Lemma 21: Suppose that i) (Monotonicity) If, then ii) (Closure properties) iii) (Maximum solution) is the maximum solution of the equation, ie, for any satisfying, iv) can be computed recursively from the following equations: (1) (2) Lemma 22 (Feedback): Suppose that i) For the equation is the maximum solution ii) If, then is the unique solution iii) Under the condition in ii), if then The proofs for Lemma 22 are identical to those in [8] [9], thus, are omitted Remark 23: As in [8], let,, be the set of nonnegative nondecreasing functions Also, let be the subset of functions in with One may then define the convolution of a function a bivariate function as follows: Under such a definition, is in One may view as a special case of for some with for all, for all Thus, the results in Lemma 22 still hold Remark 24: A bivariate function is time invariant if By letting, one can easily verify that is time invariant if only if there exists some such that As a result, time-invariant bivariate functions commute To see this, consider two invariant functions let Then (4) An important corollary of (4) is that Lemma 21(v) can be simplified as follows (cf [8, Lemma 22(xi)]): Remark 25: A bivariate function is additive if (3) (5) v) Proof: As the proofs for i) iv) are identical to those in [8] [9], we only prove v) From the monotonicity, Thus, On the other h, one has Thus, Similarly, This implies For an additive bivariate function, one easily check that which implies that Note that a bivariate function is additive if only if there is a function such that This can be easily verified by choosing

4 808 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 III DYNAMIC TRAFFIC REGULATION Given a sequence, it is defined in [10] [11] that conforms to the (static) upper envelope if for all It is also shown in [8] [1] that the optimal traffic regulator that generates output traffic conforming to a subadditive envelope is a linear time-invariant filter with the impulse response under the algebra In this section, we extend such a result to the time-varying setting We start from extending the definition of a static envelope to a dynamic envelope Definition 31: A sequence is said to conform to the dynamic upper envelope if for all there holds As in [8] [9], this characterization has the following equivalent statements The proof is omitted Lemma 32: Suppose that The following statements are equivalent i) conforms to the dynamic upper envelope ii) iii) iv) conforms to the dynamic upper envelope Given a dynamic upper envelope, one can construct a regulator such that, for any input, the output from the regulator conforms to the dynamic upper envelope This is done in the following theorem Once again, the proof is omitted Theorem 33: Suppose that Let i) (Traffic regulation) conforms to the dynamic upper envelope, thus, also conforms to the dynamic upper envelope ii) (Flow constraint) iii) (Optimality) For any that satisfies i) ii), one has iv) (Conformity) conforms to the dynamic upper envelope if only if The construction is called the maximal dynamic -regulator (for the input ) As in the time-invariant case, the flow constraint corresponds to one of the causal conditions in [19] as the number of departures cannot be larger than the number of arrivals Theorem 33(iii) shows that, under the flow constraint the constraint that the output traffic conforms to the dynamic upper envelope, the maximal -regulator is the best construction that one can implement Example 34 (Work-Conserving Link With a Time-Varying Capacity): Consider a work-conserving link with a time-varying capacity Let be the maximum number of packets that can be served at time, be the cumulative capacity in the interval, be the cumulative capacity in the interval Let be the input the output from the work-conserving link Denote by the number of packets at the link at time The work-conserving link is then governed by Lindley s equation (6) where Suppose Recursive expansion of Lindley s equation yields Since,wehave As is an additive bivariate function, we have from Remark 25 that, which shows that the work-conserving link is the maximal dynamic -regulator This example also shows that the calculation of the convolution in (8) can be easily implemented by the recursion in (6) We note that a work-conserving link with a time-varying capacity is also equivalent to a time-varying (greedy) shaper in [20] Example 35 (Traffic Regulation With a Capacity Constraint): Consider a link with a time-varying capacity The link is not necessarily work conserving As in the previous example, let be the maximum number of packets that can be served at time, be the cumulative capacity by time Let be the input output from the link Though the link may not be work conserving, the output is still constrained by the capacity, ie, Suppose that we would like to perform traffic regulation for the input such that the output conforms to the static envelope, ie, (7) (8) (9) (10) From Theorem 33, we know that the optimal implementation for the output to satisfy (9) (10) is the maximal dynamic -regulator with (11) If is bounded above by if the cumulative time-varying capacity is bounded below by some curve over any time window, ie, if for all,, then one can derive static service curves bounding below the maximal dynamic -regulator (11) Such curves are obtained in [15], [22], [23] IV DYNAMIC TRAFFIC CLIPPING The maximal dynamic -regulator solves the traffic-regulation problem with an infinite buffer In this section, we consider the traffic-regulation problem without a buffer The question is then how one drops packets optimally such that the output conforms to a dynamic envelope Such a problem was previously solved in [16]; however, the solution in [16] cannot be easily implemented directly In the following theorem, we present a recursive construction for the solution Theorem 41: Suppose that Let, where The following statements then hold

5 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES 809 i) (Traffic regulation) conforms to the dynamic upper envelope ii) (Clipping constraint) for all iii) (Optimality) For any that satisfies i) ii), one has iv) can be constructed by the following recursive equation: It then follows from Lemma 22(i) that is the maximum solution of (16) Note that Thus, is the maximum solution that satisfies i) ii) To see iv), note from Lemma 21(iv) that can be constructed recursively as follows: (12) with v) (Conformity) conforms to the dynamic upper envelope if only if The construction in (12) is called the maximal dynamic -clipper (for the input ) in this paper Proof: For any, we have from Lemma 21(iv) that with Since satisfies the clipping constraint, (17) This implies that, hence, so that is conformant to, establishing i) To see ii), note similarly that Thus, (18) Next, we establish iii) Suppose that ii) Since satisfies i) (13) To prove v), note that if, then it follows from (18) that Thus, conforms to the dynamic envelope On the other h, if conforms to the dynamic envelope, then where for As conforms to the dynamic envelope This implies As from Remark 25 (14) The inequality in the clipping constraint in ii) is equivalent to for all it can be rewritten as (15) with The constraints in (13) (15) are equivalent to We note that the original representation in [16] is that This is equivalent to our result in Theorem 41, as can be seen from Lemma 21(v), the fact that As in Lemma 21(v), one also has the following equivalent implementation: Applying the distributivity the fact that yields (16) (19) Note that the key difference between Theorems is the clipping constraint The clipping constraint implies that, in any given slot, the packets departing are a subset of the packets arriving in the same slot Let

6 810 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 we have be the number of packets clipped at time From (12), (20) Observe from (20) that packet loss occurs at time only when at least one of the following inequalities is violated: (21) When this happens, one then discards packets to the extent so that the above inequalities are all satisfied Note also that (12) implies that the maximal dynamic -clipper can be implemented in real time since the value of depends only on for In the following example, we illustrate how one implements the maximal dynamic -clipper by a work-conserving link with a finite buffer when for Example 42 (Work-Conserving Link With a Finite Buffer): Consider the work-conserving link with a time-varying capacity in Example 34 In addition, we assume that the buffer size of the link is, ie, at most, packets can be stored at the link Packets that arrive at the link find the buffer full are lost As in Example 34, let be the input output from the work-conserving link Denote by the number of packets at the link at time We then need to modify Lindley s equation in (6) as follows: (22) The number of lost packets at time, denoted by, is then Let be the effective input to the link, ie, For the effective input, the work-conserving link behaves like a work-conserving link with an infinite buffer Thus, we have from (7) that (23) In view of (20), the effective input to the work-conserving link with a finite buffer is, in fact, the output of the maximal dynamic -clipper with, In particular, when for all, we can implement the maximal dynamic -clipper with by constructing the effective input of a work-conserving link with constant capacity buffer This example also shows that a direct calculation of the convolution in (12) may not be necessary, the convolution in this example can be computed recursively by (22) For the maximal dynamic -clipper with the input the output, let be the cumulative losses at the clipper by time As in Theorem 41, using (2) yields (24) where is any subset of with This was previously shown in [16, Corollary 1] A similar result is also obtained in [22] for both the continuous discrete time settings Example 43 (Clippers in Tem): Now we compare the output from the maximal dynamic -clipper a concatenation of the maximal dynamic -clipper the maximal dynamic -clipper Let be the input to both systems, be the output from the maximal dynamic -clipper, be the output from the maximal dynamic -clipper, be the output from the maximal dynamic -clipper Also let be the cumulative losses at the maximal dynamic -clipper by time Similarly, let From Theorem 41, we have for all assuming This then implies This implies that conforms to the dynamic upper envelope that Thus, for all by Theorem 41 In fact, a concatenation of the maximal dynamic -clipper maximal dynamic -clipper is a suboptimal implementation of an -clipper The reason for this, as observed in [16], is that the discarding of packets in the -clipper is not accounted for in the -clipper

7 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES 811 Example 44 (Clippers in Parallel): Continue from the previous example Since clippers in tem are suboptimal may yield more cumulative losses than the optimal one, we may use this to compare the cumulative losses for clippers in parallel Now suppose both the maximal dynamic -clipper maximal dynamic -clipper are fed with the input Let be the outputs from these two clippers be the cumulative losses at these two clippers by time Clearly, It is easy to see from (24) that Thus, we still have for all This is previously reported in [16, Corollary 2] V CONSTRAINED TRAFFIC REGULATION The two traffic-regulation problems, with an infinite buffer without a buffer, are two extreme cases In practice, packets (or cells) may be queued delayed at a regulator However, there might be constraints for the buffer size the delay In this regard, one might have to discard (ie, clip) some packets from the input so that the buffer delay constraints can be satisfied The question is then how one discard packets optimally so that the number of clipped packets can be minimized Such a problem is called constrained traffic regulation was first considered in [19] for -leaky buckets Our objective in this section is to provide a general, simple, optimal solution for the constrained traffic-regulation problem To formalize the problem of constrained traffic regulation with buffer delay constraints, we let be the input be the output from the regulator We require that the buffer occupancy in the regulator be less than or equal to, the delay be bounded above by, that the output be conformant to a dynamic envelope Due to these constraints, packets may need to be discarded Let be the effective input, ie, counts the total number of packets arriving up to including slot, which eventually depart the regulator without being discarded The objective is to maximize the effective input the output, given the buffer delay constraints the constraint that conforms to the dynamic envelope More formally, given the input a dynamic envelope, we seek, which are as large as possible subject to the following constraints (C1) (Clipping constraint) for all (C2) (Buffer constraint) for all, where is the buffer size at the regulator (C3) (Delay constraint) for all, where is the maximum tolerable delay at the regulator (as the regulator serves packets in the FCFS order) (C4) (Traffic regulation) conforms to the dynamic upper envelope (C5) (Flow constraint) for all The clipping constraint implies that the packets in the effective input is a subset of the packets in for any time We note that the clipping constraint does not imply that packets arriving at time have to be clipped at time In fact, they could be clipped at some time later than However, as will be shown below, optimal clipping can be greedy only those packets arriving at time need to be clipped at time Note also that the natural buffer constraint should be, where is the cumulative number of packets arriving up to time, which have not been discarded at the end of slot Our buffer constraint is, in fact, less restrictive as for all However, as the below theorem shows, the optimal value of can be computed without knowledge of for so that packets that will eventually be discarded in an optimal clipper can, in fact, be discarded when they arrive Assuming this is the case, the backlog of packets in the optimal regulator at the end of slot is Theorem 51: Suppose that Let be the output from the maximal dynamic -clipper for the input, where Also, let be the output from the maximal dynamic -regulator for the input All constraints (C1) (C5) are then satisfied Moreover, for any that satisfy (C1) (C5), one has The construction of, based on a concatenation of the maximal dynamic -clipper the maximal dynamic -regulator, is called the maximal dynamic -regulator with delay buffer Proof: Suppose that are as stated in the theorem Theorem 41 then implies (C1), also implies that Conditions (C4) (C5) follow from Theorem 33(i) (ii) To establish (C2), note that Similarly, to establish (C3), note that Since for is nonnegative, it, therefore, follows that, which establishes (C3) Thus, (C1) (C5) are satisfied as claimed Next, suppose that satisfy (C1) (C5) From Theorem 33(iii), we know that, under the flow constraint in (C5) the traffic constraint (C4), we have (25) Moreover, combining this with (C2) (C3), we obtain (C2 ) (Buffer constraint) for all (C3 ) (Delay constraint) for all The buffer constraint in (C2 ) can be rewritten as (26)

8 812 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 with Since is nondecreasing in is nonnegative (27) Due to the conditions in (27), the delay constraint in (C3 ) can be rewritten as (28) with Using the idempotency distributivity, the constraints in (26) (28) are equivalent to (29) Note that for all, where is defined in Theorem 51 Thus, conforms to the dynamic envelope Using Theorem 41(iii) the assumption that satisfies (C1), it, therefore, follows that From the monotonicity of, we also have from (25) that Fig 1 Work-conserving link with a finite buffer There is a well-known duality interpretation for a work-conserving link with a finite buffer One may view the cumulative capacity as the cumulative number of tokens generated by time As in a leaky bucket, every packet needs to grab a token for its departure Thus, packet losses occur when the buffer is full token losses occur when the buffer is empty To be precise, let be the number of packets at the link at time, be the cumulative number of packet losses by time, be the cumulative number of token losses by time Fig 1 represents this system One then has the following conditions of complementary slackness: for all for all where if the event is true 0 otherwise As We note that, for the special cases that (without delay constraint) that (without buffer constraint), the results were previous obtained in [22, Ch 9] The result in Theorem 51 not only finds a representation of the optimal traffic regulator that satisfies both the delay buffer constraints, but also provides a method for the implementation of such a regulator In [19], the buffer delay constraints are treated separately, it is shown that the optimal solution can be implemented by the greedy flow controller, which discards packets only when needed As shown in Theorem 51, the maximal dynamic -regulator with delay buffer is still the greedy flow controller as the maximal dynamic -clipper discards packets only when needed Example 52 (Work-Conserving Link with a Finite Buffer): In this example, we show that a work-conserving link with a finite buffer solves a traffic-regulation problem with a buffer constraint Consider the work-conserving link with a time-varying capacity a finite buffer in Example 42 As in Examples 34 42, let,, be the input, effective input, output of the link, respectively As we have shown from Example 42, the effective input to the link is, in fact, the output of the maximal dynamic -clipper with Also, from Example 34, the output from the link is the output from the maximal dynamic -regulator with Thus, the link is a concatenation of the maximal dynamic -clipper the maximal dynamic -regulator We then have from Theorem 51 that the work-conserving link with a finite buffer is the maximal dynamic -regulator with buffer, where the work-conserving link with a finite buffer solves the so-called Skorokhod reflection problem with two boundaries [28], where is the free process, is the lower boundary process, is the upper boundary process (see, eg, [18] [19] for more detailed discussions of the reflection problem) Since the work-conserving link with a finite buffer also solves the buffer-constrained traffic-regulation problem, it follows from (24) that the upper boundary process of the reflection problem admits the following close-form representation (in terms of the free process): where is any subset of with Using (2), one can also show that the lower boundary process admits the following closed-form representation: where the sum in the right-h side is 0 for We also note the queue-length process can also be represented in closed form Two representations based on, plus operations were given in [14]

9 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES 813 Example 53 (Multiple Leaky Buckets With Buffer Delay Constraints): Now consider the maximal dynamic -regulator with delay buffer when This corresponds to the case of multiple leaky buckets with the delay constraint the buffer constraint In this case, Thus, one can construct the maximal dynamic -clipper by feeding the input to parallel bufferless, -leaky buckets A packet is discarded (or clipped) if it cannot be admitted to one of these leaky buckets The output from the maximal dynamic -clipper is then fed into another parallel -leaky buckets with buffer This example also shows that a direct calculation of the convolution in (12) may not be necessary, as leaky buckets are known to have recursive implementations To bound the cumulative loss for the maximal dynamic -clipper in this example, we may apply the comparison result in Example 44 Consider maximal dynamic clippers, all subject to the same input The th clipper is the maximal dynamic -clipper with Let be the cumulative number of losses by time at the th clipper From Example 44, is an upper bound for the cumulative loss for the maximal dynamic -clipper Now is much easier to compute, as it is simply the cumulative loss for a work-conserving link with capacity buffer in Example 52 Example 54 (Bounding Losses by Segregation Between Buffer Policer): We have shown in Theorem 51 that the maximal dynamic -regulator with buffer is the optimal implementation to generate an output conforming to the dynamic envelope subject to the buffer constraint In this example, we will show that segregation of buffer discard policing discard provides an upper bound on the cumulative losses for the maximal dynamic -regulator with buffer As we have shown in Theorem 51, the first stage of the maximal dynamic -regulator with buffer is the maximal dynamic -clipper, where (30) Let,, be its input, output, the cumulative losses by time, ie, We now compare the cumulative losses with the losses in another system made of two parts, as shown in Fig 2 The first part is some causal system with storage capacity We know, however, that the first part discards packets as soon as the total backlogged packets in this system exceeds This operation is called buffer discard, Fig 2 Storage/policer system with separation between losses due to buffer discard policing discard the amount of buffer discarded packets by time is denoted by The second part is the maximal dynamic -clipper referred to here as the policer Packets are discarded as soon as the total output of the storage system exceeds the maximum output allowed by the policer This operation is called policing discard, the amount of discarded packets by time due to policing is denoted by We show that Let be the output of the buffer clipper, be the input output of the policer clipper, respectively As is the output of the maximal dynamic -clipper Now let be the effective input to the system, ie, Also, as shown in Fig 2, we have Since have from (32) that (31) (32) (33) (34) is a nondecreasing function in,we (35) On the other h, because the storage system is causal, it satisfies the flow constraint Since its storage space is limited to Using (32) (33), we have for all, we also have From (30), (31), (34), (36), (37), it then follows that (36) (37) (38) Combining (35) with (38), one notices that satisfies the same constraints as As is the output from the optimal implemen-

10 814 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 tation in Theorem 51, it follows that or, equivalently, that Such a separation of resources between the buffered system policing system is used in the estimation of loss probability for devising statistical CAC algorithms as proposed by Lo Presti et al [26] (see also Elwalid et al [17]) VI DYNAMIC SERVICE GUARANTEES To guarantee end-to-end deterministic QoS for an input, the concept of service curves is developed in [1], [12], [20] to work with the static envelopes of Cruz [10], [11] A server is called a static -server ( ) for an input sequence if its output sequence satisfies (39) for all Based on this, there is an associated filtering theory (under the algebra) in [1], [8], [20] that eases design computation of deterministic QoS Our main objective in this section is to extend the concept of service curves the associated filtering theory to the time-varying setting so that dynamic QoS can be guaranteed The theory is based on the following definition of a dynamic -server Definition 61 (Dynamic -Server): A server is called a dynamic -server ( ) for an input sequence if its output sequence satisfies, ie, (40) for all If the inequality in (40) is satisfied for all input sequences, then we say the dynamic -server is universal If the inequality in (40) is an equality, we say the dynamic -server is exact Analogous to the filtering theory for static service curves, one may view the right-h side of (40) as the output from a linear filter with the time-varying impulse response under the algebra If is a time-invariant bivariate function, then the dynamic -server is equivalent to a static -server, where Clearly, the maximal dynamic -regulator is a universal exact dynamic -server Analogous to the time-invariant case, one has the following properties in Theorems for dynamic -servers The proofs are omitted, as they are identical to those in [8] [9] Theorem 62 (Concatenation): A concatenation of a dynamic -server for an input sequence a dynamic -server for the output from the dynamic -server is a dynamic -server for, where Theorem 63 (Filter Bank Summation): Consider an input sequence Let (respectively, ) be the output from a dynamic -server (respectively, -server) for The output from the filter bank summation, denoted by, is The filter bank summation of a dynamic -server for a dynamic -server for is then a dynamic -server for, where Theorem 64 (Feedback): Consider an input sequence a dynamic -server for, where, is the output from the dynamic -server If, then the feedback system is a dynamic -server for Theorem 65: Consider a dynamic -server for Let be the output Also, let be the maximum queue length at the server, where Let : for all be the maximum delay at the server Suppose that conforms to the dynamic upper envelope i) (Queue length) ii) (Output burstiness) If, then conforms to the dynamic upper envelope, where iii) (Delay) : Remark 66: As the maximal dynamic -regulator is a dynamic -server, there is an intuitive explanation why the maximal dynamic -regulator with delay buffer is a concatenation of the maximal dynamic -clipper (with being defined in Theorem 51) the maximal dynamic -regulator As shown in Theorem 41, the output from the maximal dynamic -clipper conforms to the dynamic envelope When such an output is fed to the maximal dynamic -regulator, one has from Theorem 65 that the delay at the maximal dynamic -regulator is bounded above by the queue length is also bounded above by Thus, both the delay constraint buffer constraint are satisfied In the following, we illustrate the use of dynamic service guarantees by a dynamic window-flow-control problem Example 67 (Dynamic Window Flow Control): Consider a network with the input the output Suppose that the network enforces a dynamic window flow control for the input with the dynamic window size We assume that For the dynamic window-flow-control system, the effective input to the network, denoted by, satisfies (41) Observe that, where is the function with for One may rewrite (41) as follows: Also, we assume that the network is a dynamic the effective input, ie, In conjunction with (42) (42) -server for (43) where we apply the distributive property the associativity of Since we assume that

11 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES 815 We then have from Lemma 22(iii) that Thus, the dynamic window-flow-control system is a dynamic -server VII DYNAMIC SCED SCHEDULING ALGORITHM In this section, we define a scheduling algorithm, called the dynamic SCED algorithm, which we will show achieves the dynamic service guarantees in Section VI Consider a server with a time-varying capacity Let be the maximum number of packets that can be served at time, be the cumulative capacity in the interval A policy is called the EDF if the server schedules the packets according to their deadlines Note that the EDF policy is work conserving, ie, the server serves packets whenever there are packets at the server Now consider feeding streams of inputs to such a server Let be the cumulative number of packet arrivals of the th stream up to time Each packet is assigned a deadline We assume that the deadlines within the same stream are nondecreasing Also, let be the number of packets from the th stream that have deadlines not greater than As we assume the deadlines for each stream is nondecreasing, packet from stream is assigned the deadline from the following inverse mapping: (44) Theorem 71: Suppose that the server is operated under the EDF policy The necessary sufficient condition for every packet to be served not later than its deadline is ii) We prove the sufficient part by contradiction, as in [25] Suppose that the first packet that misses its deadline occurs at time Let be the last slot no later than such that the server serves less than packets Since the EDF policy is work conserving,, as there is at least one stream packet backlogged at time Moreover, there are exactly packets served in the interval Now let be the last slot in the interval, during which a packet with deadline greater than is served If all the packets served during the interval have deadlines less than or equal to, then define (in this case, there are no backlogged packets at the end of slot ) Thus, during the interval, exactly packets are served, each of these packets has a deadline that is less than or equal to Let be the set of streams that are not backlogged at the end of slot We claim that those packets served in can only come from the streams in Suppose that stream is not in Since there is a packet with deadline greater than that is served in slot, all the backlogged stream packets at the end of slot must have deadlines greater than This implies all the stream packets with deadlines not greater than have been served, as we assume the deadlines are nondecreasing within the same stream Thus, those packets served in can only come from the streams in, as those packets have deadlines less than or equal to Now suppose that stream is in As there are no backlogged stream packets at the end of slot, all the stream packets that arrive not later than have been served Thus, the number of stream packets that can be served in is bounded above by This, in turn, implies that the number of packets served in is bounded above by As there is a packet that misses its deadline at time, the bound is strict Thus, (45) for all for every that is a subset of Proof: i) We first prove the necessary part Let be the cumulative number of packet departures from all streams up to time Since the EDF policy is work conserving, we have from Example 34 that As we assume that every packet is served not later than its deadline for some that is a subset of with As is a subset of, we have a contradiction to (45) Lemma 72: Suppose we choose some, If for all, then all the packets are served not later than their deadlines Such a deadline assignment scheme is called the dynamic SCED algorithm in this paper Proof: It suffices to verify that the sufficient condition in Theorem 71 is satisfied Note that for every in (46) for all Let be a subset of Suppose that we now only have the streams in (the packets from other streams are discarded) Based on a stard sample path argument, it is clear that, under the EDF policy, every packet is still served not later than its deadline Following the same argument as in (46) yields (45)

12 816 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 6, DECEMBER 2002 where we use in the last two inequalities The next lemma implies that deadlines in the dynamic SCED algorithm can be assigned in real time Specifically, if packet from stream arrives during slot, can be computed without knowledge of for Lemma 73: Suppose packet from stream arrives during slot Under the dynamic SCED algorithm, where Proof: Note that, under the dynamic SCED algorithm (47) (48) Since packet arrives at time,wehave for Thus, when, which implies that by definition of in (48) Therefore, by definition of,wehave By definition of, this implies To show the reverse inequality, note that by definition of, we have (49) Since for is nonnegative, inequality (49) implies that By definition of, this then implies that In Theorem 74, we state the admission criteria for the dynamic SCED algorithm for a server with a time-varying capacity Once the admission criteria are met, the dynamic SCED algorithm can then be used for providing dynamic service guarantees Theorem 74: A set of arrival streams, indexed, arrives to a server The arrival sequence of the th stream is denoted by, is known to conform to the dynamic upper envelope The server has a time-varying capacity to serve up to packets during slot Under the dynamic SCED algorithm, the server is a dynamic -server for for all if the following condition is satisfied for all : (50) Proof: As we assume that conforms to the dynamic upper envelope, we have from Lemma 32(ii) that Thus, where we apply the associativity of From Lemma 72, it then follows that all the packets are served before their deadlines Denote by the cumulative number of departures from stream by time Thus, the server is a dynamic -server for for all VIII CONCLUSIONS By extending the filtering theory under the ) algebra to the time-varying setting, we solved the problem of constrained traffic regulation For a constrained traffic-regulation problem with maximum tolerable delay maximum buffer size, we showed that the optimal regulator that generates the output traffic conforming to a dynamic envelope minimizes the number of discarded packets is a concatenation of the maximal dynamic -clipper with the maximal dynamic -regulator To provide dynamic service guarantees in a network, we developed the concept of the dynamic -server as a basic network element We showed that dynamic servers can be joined by concatenation, filter bank summation, feedback to form a composite dynamic server We also proposed the dynamic SCED scheduling algorithm to achieve dynamic service guarantees for a work-conserving link subject to multiple inputs One possible application of the time-varying filtering theory is dynamic admission control For a given connection, we may define a service curve to be guaranteed over the interval if a dynamic service curve is guaranteed, where if if if if if if For such a definition for dynamic service guarantees, an interesting problem is to find the relaxation time such that connection has virtually no impact on the admission criteria in Theorem 74 after Finally, we note that our approach is also applicable in the continuous-time setting, as shown in [21] [23] We also note that the bivariate function could be rom By specifying the probabilistic characteristics of the bivariate function,it is possible to provide probabilistic guarantees Previous results along this line could be found in [7] [13] REFERENCES [1] R Agrawal, R L Cruz, C Okino, R Rajan, Performance bounds for flow control protocols, IEEE Trans Networking, vol 7, pp , June 1999 [2] R Agrawal R Rajan, A general framework for analyzing schedulers regulators in integrated services network, in Proc 34th Annu Allerton Commun, Contr, Computing Conf, Oct 1996, pp [3], Open closed loop control in integrated services networks, in Proc 36th IEEE CDC, vol 2, Dec 1997, pp

13 CHANG et al: MIN, SYSTEM THEORY FOR CONSTRAINED TRAFFIC REGULATION AND DYNAMIC SERVICE GUARANTEES 817 [4] R Agrawal, F Baccelli, R Rajan, An algebra for queueing networks with time varying service its application to the analysis of integrated service networks, Elect Comput Eng Dept, Univ Wisconsin-Madison, Madison, WI, Tech Rep ECE-98-2 [Online] Available: May 1998 [5] F Baccelli, G Cohen, G Oslder, J Quadrat, Synchronization Linearity: An Algebra for Discrete Event Systems New York: Wiley, 1992 [6] C S Chang, Stability, queue length, delay of deterministic stochastic queueing networks, IEEE Trans Automat Contr, vol 39, pp , May 1994 [7], On the exponentiality of stochastic linear systems under the max-plus algebra, IEEE Trans Automat Contr, vol 41, pp , Aug 1996 [8], On deterministic traffic regulation service guarantees: A systematic approach by filtering, IEEE Trans Inform Theory, vol 44, pp , May 1998 [9], Matrix extensions of the filtering theory for deterministic traffic regulation service guarantees, IEEE J Select Areas Commun, vol 16, pp , June 1998 [10] R L Cruz, A calculus for network delay, Part I: Network elements in isolation, IEEE Trans Inform Theory, vol 37, pp , Jan 1991 [11], A calculus for network delay, Part II: Network analysis, IEEE Trans Inform Theory, vol 37, pp , Jan 1991 [12], Quality of service guarantees in virtual circuit switched networks, IEEE J Select Areas Commun, vol 13, pp , Aug 1995 [13], Quality of service management in integrated services networks, in Proc 1st Semiannu Res Rev, La Jolla, CA, June 1996 [14] R L Cruz H-N Liu, Single server queues with loss: A formulation, in Proc CISS Baltimore, MD, Mar 1993 [15] R L Cruz C M Okino, Service guarantees for a flow control, presented at the 34th Allerton Comm, Cont, Comp Conf, Monticello, IL, Oct 1996, Preprint, first version [16] R L Cruz M Taneja, An analysis of traffic clipping, in Proc Inform Sci, Syst Conf Princeton, NJ, 1998 [17] A Elwalid, D Mitra, R Wenworth, A new approach for allocating buffers bwidth to heterogeneous, regulated traffic in ATM node, IEEE J Select Areas Commun, vol 13, pp , Aug 1995 [18] J M Harrison, Brownian Motion Stochastic Flow Systems New York: Wiley, 1985 [19] T Konstantopoulos V Anantharam, Optimal flow control schemes that regulate the burstiness of traffic, IEEE/ACM Trans Networking, vol 3, pp , Aug 1995 [20] J Y Le Boudec, Application of network calculus to guaranteed service networks, IEEE Trans Inform Theory, vol 44, pp , May 1998 [21] J Y Le Boudec P Thiran, A note on time space methods in network calculus, in Proc Int Broadb Commun Seminar, Zurich, Switzerl, Feb 1998, pp [22], Network Calculus: A Theory of Determinstic Queueing Systems for the Internet Berlin, Germany: Springer-Verlag, 2001 [23], Network calculus using min-plus system theory, in High Performance Networks for Multimedia Applications, A Danthine, O Spaniol, W Effelsberg, D Ferrari, Eds Norwell, MA: Kluwer, 1999 [24] J Y Le Boudec A Ziedins, A CAC algorithm for VBR connections over a VBR trunk, in Proc ITC 15, Washington, DC, June 1997, pp [25] C L Liu J W Layl, Scheduling algorithms for multiprogramming in a hard-real-time environment, J Assoc Comput Mach, vol 20, pp 46 61, 1973 [26] F Lo Presti, Z-L Zhang, Z-L D, Z-L Towsley, J Kurose, Source time scale optimal buffer/bwidth trade-off for regulated traffic in an ATM node, in Proc IEEE Infocom 97, Kobe, Japan, pp [27] H Sariowan, R L Cruz, G C Polyzos, SCED: A generalized scheduling policy for guaranteeing quality-of-service, IEEE/ACM Trans Networking, vol 7, pp , Oct 1999 [28] A Skorokhod, Stochastic equations for diffusion processes in a bounded region, Theory Probab Appl, vol 6, pp , 1961 Cheng-Shang Chang (S 85 M 86 SM 93) received the BS degree from the National Taiwan University, Taipei, Taiwan, ROC, in 1983, the MS PhD degrees from Columbia University, New York, NY, in , respectively, all in electrical engineering From 1989 to 1993, he was a Research Staff Member with the IBM Thomas J Watson Research Center, Yorktown Heights, NY Since 1993, he has been with the Department of Electrical Engineering, National Tsing Hua University, Taiwan, ROC, where he is a Professor His current research interests are concerned with queueing theory, stochastic scheduling, performance evaluation of telecommunication networks parallel processing systems He authored Performance Guarantees in Communication Networks (New York: Springer, 2000) served as an Editor for Operations Research from 1992 to 1999 Dr Chang was the recipient of an IBM Outsting Innovation Award in 1992, an IBM Faculty Partnership Award in 2001, Outsting Research Awards from the National Science Council, Taiwan, R,OC, in , respectively Rene L Cruz (S 80 M 84 SM 90) received the BS PhD degrees from the University of Illinois at Urbana-Champaign, in , respectively, the SM degree from the Massachusetts Institute of Technology (MIT), Cambridge, in 1982, all in electrical engineering Since 1987, he has been with the University of California at San Diego, La Jolla, where he is currently a Professor of electrical computer engineering Dr Cruz was a program co-chair of the 2001 IEEE INFOCOM Conference a general co-chair of the Association for Computing Machinery (ACM) SIGCOMM Conference He was an associate editor for the IEEE TRANSACTIONS ON INFORMATION THEORY from 1994 to 1997 Jean-Yves Le Boudec graduated from the Ecole Normale Superieure de Saint-Cloud, Paris, France He received the Doctorate degree from the University of Rennes, Rennes, France, in 1984 In 1987, he joined Bell Northern Research, Ottawa, ON, Canada, where he was a Member of Scientific Staff with the Network Product Traffic Design Department In 1988, he joined the IBM Zurich Research Laboratory, Zurich, Switzerl, where he was Manager of the Customer Premises Network Department In 1994, he joined the professor at Ecole Polytechnic Fédérale de Lausanne (EPFL) Lausanne, Switzerl, as a Professor is currently a Full Professor His interests are in the architecture performance of communication systems Patrick Thiran (S 88 M 90) received the Electrical Engineering Degree from the Université Catholique de Louvain, Louvain-la-Neuve, Belgium, in 1989, the MS degree in electrical engineering from the University of California at Berkeley, in 1990, the PhD degree from the Ecole Polytechnic Fédérale de Lausanne (EPFL), Lausanne, Switzerl, in 1996 While with the EPFL, he was initially with the Circuits Systems Group, where he was involved with nonlinear circuits systems (including neural networks) until 1996 He then joined the Communication Networks Laboratory, EPFL, where he became a Professor (Professeur titulaire) in 1998 From 2000 to 2001, he was with Sprintlabs, Burlingame, CA He is currently an Assistant Professor with the School of Computer Communication Sciences, EPFL His research interests are communication networks, performance analysis, dynamical systems, stochastic models Dr Thiran is a Fellow of the Belgian American Educational Foundation He was an associate editor for the IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS from 1997 to 1999 He was the recipient of the 1996 EPFL Doctoral Prize

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY Application of Network Calculus to Guaranteed Service Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY Application of Network Calculus to Guaranteed Service Networks IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 1087 Application of Network Calculus to Guaranteed Service Networks Jean-Yves Le Boudec, Member, IEEE Abstract We use recent network calculus

More information

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering

On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering Shivendra S. Panwar New York State Center for Advanced Technology in Telecommunications (CATT) Department of Electrical

More information

An Efficient Implementation of Burst Fair Queuing for ATM Networking

An Efficient Implementation of Burst Fair Queuing for ATM Networking An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

INTEGRATION of data communications services into wireless

INTEGRATION of data communications services into wireless 208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Optimality of Periodwise Static Priority Policies in Real-time Communications

Optimality of Periodwise Static Priority Policies in Real-time Communications Optimality of Periodwise Static Priority Policies in Real-time Communications I-Hong Hou, Anh Truong, Santanu Chakraborty and P. R. Kumar Abstract We consider the problem of real-time communication with

More information

Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows

Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows Gianluca Rizzo EPFL, CH-1015 Lausanne, Switzerland Email: gianluca.rizzo@epfl.ch Jean-Yves

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems (cont.) Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 Previous Lecture General concepts of the performance

More information

A Survey of Deterministic and Stochastic Service Curve Models in the Network Calculus

A Survey of Deterministic and Stochastic Service Curve Models in the Network Calculus IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 1, FIRST QUARTER 2010 59 A Survey of Deterministic and Stochastic Service Curve Models in the Network Calculus Markus Fidler Abstract In recent years

More information

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,

More information

Traffic Pattern Analysis in Multiprocessor System

Traffic Pattern Analysis in Multiprocessor System International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 6, Number 1 (2013), pp. 145-151 International Research Publication House http://www.irphouse.com Traffic Pattern Analysis

More information

Nested QoS: Providing Flexible Performance in Shared IO Environment

Nested QoS: Providing Flexible Performance in Shared IO Environment Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman hw5@rice.edu pjv@rice.edu Rice University, USA Abstract The increasing popularity of storage and server consolidation

More information

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Aniruddha Diwan ECE Department Indian Institute of Science Bangalore

More information

ARITHMETIC operations based on residue number systems

ARITHMETIC operations based on residue number systems IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 2, FEBRUARY 2006 133 Improved Memoryless RNS Forward Converter Based on the Periodicity of Residues A. B. Premkumar, Senior Member,

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE 1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER 2005 End-to-End Delay Bounds for Traffic Aggregates Under Guaranteed-Rate Scheduling Algorithms Wei Sun, Student Member, IEEE, and Kang

More information

A Hierarchical Fair Service Curve Algorithm for Link-Sharing, Real-Time, and Priority Services

A Hierarchical Fair Service Curve Algorithm for Link-Sharing, Real-Time, and Priority Services IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 2, APRIL 2000 185 A Hierarchical Fair Service Curve Algorithm for Link-Sharing, Real-Time, and Priority Services Ion Stoica, Hui Zhang, Member, IEEE, and

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Queueing Delays in Rate Controlled ATM Networks

Queueing Delays in Rate Controlled ATM Networks Queueing Delays in Rate Controlled ATM Networks Anindo Banerjea CS Division, University of California, Berkeley, CA 94704 and International Computer Science Institute, Berkeley Srinivasan Keshav AT&T Bell

More information

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd T-Spec Eamples for Audio-Video Bridging Osama Aboul-Magd Source TSPEC for IP Intserv > Five parameters describing the traffic, p, r, b, m, M. > Peak rate, p measured in bytes of IP datagram per second

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

A Recursive Estimator of Worst-Case Burstiness

A Recursive Estimator of Worst-Case Burstiness IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 2, APRIL 2001 211 A Recursive Estimator of Worst-Case Burstiness Shahrokh Valaee, Member, IEEE Abstract The leaky-bucket regulator has several potential

More information

Admission Control Framework to Provide Guaranteed Delay in Error-Prone Wireless Channel

Admission Control Framework to Provide Guaranteed Delay in Error-Prone Wireless Channel University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering January 2007 Admission Control Framework to Provide Guaranteed Delay in Error-Prone

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

IN A WIRELESS network, many users communicate over a

IN A WIRELESS network, many users communicate over a IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 1, FEBRUARY 1999 75 Delivering QoS Requirements to Traffic with Diverse Delay Tolerances in a TDMA Environment Jeffrey M. Capone, Member, IEEE, and Ioannis

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks

Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks 2002 Conference on Information Sciences and Systems, Princeton University, March 20-22, 2002 Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj

More information

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 57, NO 2, FEBRUARY 2012 435 On the Existence of Supervisory Policies That Enforce Liveness in Partially Controlled Free-Choice Petri Nets R S Sreenivas, Senior

More information

THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH*

THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH* SIAM J. COMPUT. Vol. 1, No. 2, June 1972 THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH* A. V. AHO, M. R. GAREY" AND J. D. ULLMAN Abstract. We consider economical representations for the path information

More information

On Achieving Throughput in an Input-Queued Switch

On Achieving Throughput in an Input-Queued Switch 858 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 On Achieving Throughput in an Input-Queued Switch Saad Mneimneh and Kai-Yeung Siu Abstract We establish some lower bounds on the speedup

More information

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks 60 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 3, NO. 1, MARCH 2002 Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

More information

4. Conclusion. 5. Acknowledgment. 6. References

4. Conclusion. 5. Acknowledgment. 6. References [10] F. P. Preparata and S. J. Hong, Convex hulls of finite sets of points in two and three dimensions, Communications of the ACM, vol. 20, pp. 87-93, 1977. [11] K. Ichida and T. Kiyono, Segmentation of

More information

MAX-MIN FAIRNESS is a simple, well-recognized

MAX-MIN FAIRNESS is a simple, well-recognized IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 1073 A Unified Framework for Max-Min and Min-Max Fairness With Applications Božidar Radunović, Member, IEEE, and Jean-Yves Le Boudec, Fellow,

More information

Stochastic Delay Analysis for Protocols with Self-similar Traffic

Stochastic Delay Analysis for Protocols with Self-similar Traffic 22 7th International ICST Conference on Communications and Networking in China (CHINACOM) Stochastic Delay Analysis for 82 Protocols with Self-similar Traffic Jie Zhang, Li Yu, Lie Jiang, Jingjing Luo

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

A General Purpose Queue Architecture for an ATM Switch

A General Purpose Queue Architecture for an ATM Switch Mitsubishi Electric Research Laboratories Cambridge Research Center Technical Report 94-7 September 3, 994 A General Purpose Queue Architecture for an ATM Switch Hugh C. Lauer Abhijit Ghosh Chia Shen Abstract

More information

Reliability Benefit of Network Coding

Reliability Benefit of Network Coding Reliability Benefit of Majid Ghaderi, Don Towsley and Jim Kurose Department of Computer Science University of Massachusetts Amherst {mghaderi,towsley,kurose}@cs.umass.edu Abstract The capacity benefit

More information

On the interconnection of message passing systems

On the interconnection of message passing systems Information Processing Letters 105 (2008) 249 254 www.elsevier.com/locate/ipl On the interconnection of message passing systems A. Álvarez a,s.arévalo b, V. Cholvi c,, A. Fernández b,e.jiménez a a Polytechnic

More information

Lower bounds and recursive methods for the problem of adjudicating conflicting claims

Lower bounds and recursive methods for the problem of adjudicating conflicting claims Lower bounds and recursive methods for the problem of adjudicating conflicting claims Diego Dominguez University of Rochester March 31, 006 Abstract For the problem of adjudicating conflicting claims,

More information

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm

More information

Chapter 16. Greedy Algorithms

Chapter 16. Greedy Algorithms Chapter 16. Greedy Algorithms Algorithms for optimization problems (minimization or maximization problems) typically go through a sequence of steps, with a set of choices at each step. A greedy algorithm

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

LEAN buffering is the smallest buffer capacity, which is

LEAN buffering is the smallest buffer capacity, which is 298 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 5, NO. 2, APRIL 2008 Lean Buffering in Serial Production Lines With Nonidentical Exponential Machines Shu-Yin Chiang, Alexer Hu, Semyon

More information

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS

More information

Telecommunication Networks and Computer Systems

Telecommunication Networks and Computer Systems Telecommunication Networks and Computer Systems Series Editor Professor Solange Ghemaouti-Helie Springer-Verlag Berlin Heidelberg GmbH Other titles published in this Series: Scrambling Techniques for Digital

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Authors Abugchem, F. (Fathi); Short, M. (Michael); Xu, D. (Donglai)

Authors Abugchem, F. (Fathi); Short, M. (Michael); Xu, D. (Donglai) TeesRep - Teesside's Research Repository A Note on the Suboptimality of Nonpreemptive Real-time Scheduling Item type Article Authors Abugchem, F. (Fathi); Short, M. (Michael); Xu, D. (Donglai) Citation

More information

Loss Performance Analysis for Heterogeneous

Loss Performance Analysis for Heterogeneous IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 1, FEBRUARY 2002 125 Loss Performance Analysis for Heterogeneous ON OFF Sources With Application to Connection Admission Control Guoqiang Mao, Student

More information

Quickest Search Over Multiple Sequences with Mixed Observations

Quickest Search Over Multiple Sequences with Mixed Observations Quicest Search Over Multiple Sequences with Mixed Observations Jun Geng Worcester Polytechnic Institute Email: geng@wpi.edu Weiyu Xu Univ. of Iowa Email: weiyu-xu@uiowa.edu Lifeng Lai Worcester Polytechnic

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

THE DELAY COMPOSITION THEOREM ON PIPELINE SYSTEMS WITH NON-PREEMPTIVE PRIORITY VARYING SCHEDULING ALGORITHMS YI LU THESIS

THE DELAY COMPOSITION THEOREM ON PIPELINE SYSTEMS WITH NON-PREEMPTIVE PRIORITY VARYING SCHEDULING ALGORITHMS YI LU THESIS THE DELAY COMPOSITION THEOREM ON PIPELINE SYSTEMS WITH NON-PREEMPTIVE PRIORITY VARYING SCHEDULING ALGORITHMS BY YI LU THESIS Submitted in partial fulfillment of the requirements for the degree of Master

More information

Fundamental Trade-offs in Aggregate Packet Scheduling

Fundamental Trade-offs in Aggregate Packet Scheduling Fundamental Trade-offs in Aggregate Packet Scheduling Zhi-Li Zhang Ý, Zhenhai Duan Ý and Yiwei Thomas Hou Þ Ý Dept. of Computer Science & Engineering Þ Fujitsu Labs of America University of Minnesota 595

More information

IEEE Communications Surveys & Tutorials 3rd Quarter

IEEE Communications Surveys & Tutorials 3rd Quarter 3RD QUARTER 26, VOLUME 8, NO. 3 www.comsoc.org/pubs/surveys A SURVEY OF ENVELOPE PROCESSES AND THEIR APPLICATIONS IN QUALITY OF SERVICE PROVISIONING SHIWEN MAO, AUBURN UNIVERSITY SHIVENDRA S. PANWAR, POLYTECHNIC

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Analysis of Power Management for Energy and Delay Trade-off in a WLAN

Analysis of Power Management for Energy and Delay Trade-off in a WLAN Analysis of Power Management for Energy and Delay Trade-off in a WLAN Mahasweta Sarkar and Rene.L Cruz Department of Electrical and Computer Engineering University of California at San Diego La Jolla,

More information

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin Delay Analysis of Fair Queueing Algorithms with the Stochastic Comparison Approach Nihal Pekergin PRi SM, Universite de Versailles-St-Quentin 45 av des Etats Unis, 78 035 FRANCE CERMSEM, Universite de

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

A Survey of Recent Results on Real-Time Wireless Networking

A Survey of Recent Results on Real-Time Wireless Networking A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department

More information

Lecture 17 Multimedia Transport Subsystem (Part 3)

Lecture 17 Multimedia Transport Subsystem (Part 3) CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:

More information

Quality Differentiation with Source Shaping and Forward Error Correction

Quality Differentiation with Source Shaping and Forward Error Correction Quality Differentiation with Source Shaping and Forward Error Correction György Dán and Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology, {gyuri,viktoria}@imit.kth.se

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

1040 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010

1040 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 1040 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 A System-Theoretic Approach to Bandwidth Estimation Jörg Liebeherr, Fellow, IEEE, Markus Fidler, Senior Member, IEEE, and Shahrokh

More information

Simulation of Reliability in Multi-server Computer Networks

Simulation of Reliability in Multi-server Computer Networks Simulation of Reliability in Multi-server Computer Networks SAULIUS MINKEVIČIUS, VU Institute of Mathematics Informatics, Akademijos 4, 08663 Vilnius, Lithuania Vilnius University Mathematics Informatics

More information

IN OUR APPROACH to packet-scheduling, the designer first

IN OUR APPROACH to packet-scheduling, the designer first 1374 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 6, DECEMBER 2006 Approximating Fluid Schedules in Crossbar Packet-Switches and Banyan Networks Michael Rosenblum, Member, IEEE, Constantine Caramanis,

More information

TCP-FRIENDLY congestion control has been advocated by

TCP-FRIENDLY congestion control has been advocated by 500 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 Impact of TCP-Like Congestion Control on the Throughput of Multicast Groups Augustin Chaintreau, François Baccelli, and Christophe Diot

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network Somchai Lekcharoen Faculty of Information Technology, Rangsit University, Thailand Email:s_lekcharoen@yahoo.com

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET Nazy Alborz IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road map Introduction to congestion control

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Dynamic Window-Constrained Scheduling for Multimedia Applications

Dynamic Window-Constrained Scheduling for Multimedia Applications Dynamic Window-Constrained Scheduling for Multimedia Applications Richard West and Karsten Schwan College of Computing Georgia Institute of Technology Atlanta, GA 3332 Abstract This paper describes an

More information

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown

Scheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown Scheduling Algorithms for Input-Queued Cell Switches by Nicholas William McKeown B.Eng (University of Leeds) 1986 M.S. (University of California at Berkeley) 1992 A thesis submitted in partial satisfaction

More information

IN A SEMINAL paper published in 1995, Shenker [18] discussed

IN A SEMINAL paper published in 1995, Shenker [18] discussed 1240 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 Distributed Rate Allocation for Inelastic Flows Prashanth Hande, Shengyu Zhang, and Mung Chiang, Member, IEEE Abstract A common assumption

More information

Shuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou

Shuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou A Service Curve of Hierarchical Token Bucket Queue Discipline on Soft-Ware Defined Networks Based on Deterministic Network Calculus: An Analysis and Simulation Shuangyin Ren, Quanyou Feng, Yu Wang, and

More information

Statistical Timing Analysis Using Bounds and Selective Enumeration

Statistical Timing Analysis Using Bounds and Selective Enumeration IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 9, SEPTEMBER 2003 1243 Statistical Timing Analysis Using Bounds and Selective Enumeration Aseem Agarwal, Student

More information